Hall - 1 |
May 27, 2012 |
Time |
Session 1
Chair : V. Sundarapandian, Vel Tech Dr. RR & Dr. SR Technical University, India |
08:00 - 09:00AM |
Registration |
08:20 - 08:40AM |
Forensic Computing Models: Technical Overview ( Gulshan Shrivastava, Akansha Dwivedi and Kavita Sharma ) |
08:40 - 09:00AM |
Analysis of Bayes, Neural Network and Tree Classifier of Classification Technique in Data Mining using WEKA ( Yugal kumar and G.Sahoo ) |
09:00 - 09:20AM |
Exploring The Current Trends And Future Prospects In Terrorist Network Mining ( Akhilesh Tiwari, Nisha Chaurasia and Astha Chharia ) |
09:20 - 09:40AM |
Emotion Detection From Text (Shiv Naresh Shivhare and Saritha Khethawat ) |
09:40 - 10:00AM |
A Hybrid Clustering Algorithm for Data Mining ( Ravindra Jain ) |
10:00 - 10:20AM |
-------------Break-------------- |
10.20 - 10.40AM
|
Analytical study of hexapode miRNAs using phylogenetic methodsn ( A.K. Mishra and H.Chandrasekharan ) |
10.40 - 11.00AM
|
Detection Techniques Of Selective Forwarding Attacks In Wireless Sensor Networks : A Survey
( Preeti Sharma ) |
11.00 - 11.20AM
|
A Modified Directional Weighted Cascaded-Mask Median Filter For Removal Of Random Impulse Noise ( J.K. Mandal and Aparna Sarka ) |
11.20 - 11.40AM
|
Steganography Using Adaptive Pixel Value Differencing(Apvd) Of Gray Images Through Exclusion Of Overflow/Undflow ( J.K. Mandal and Debashis Das ) |
11.40 - 12.00PM
|
Efficient Utilization Of Channels Using Dynamic Guard Channel Allocation With Channel Borrowing Strategy In Handoffs
( Alagu S and Meyyappan T ) |
12.00 - 12.20PM |
A Novel Ant Colony Algorithm For Multicast Routing In Wireless Ad Hoc Networks
( Sunita Prasad, Zaheeruddin and D. K. Lobiyal T ) |
12.20 - 01.40PM |
-----------Lunch Break----------- |
Time |
Session 2
Chair : A. K. Mishra, USI,IARI, Delhi |
01.40 - 2.00PM
|
Information Security through Image Watermarking using Least Significant Bit Algorithm ( Puneet Kr Sharma and Rajni ) |
2.00 - 2.20PM
|
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks ( Jayashree V. Shiral and. Bhushan N. Mahajan ) |
2.20 - 2.40PM
|
Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks
( Amit Kumar, Dhirendra Srivastav and Suchismita Chinara ) |
2.40 - 3.00PM
|
Energy Optimisation Schemes For Wireless Sensor Network ( Vivekanand Jha ,Elisha Chauhan,Harshpreet Kaur and Neeharika Taneja ) |
3.00 - 3.20PM
|
Object-Oriented Database Model For Effective Mining Of Advanced Engineering Materials Data Sets ( Doreswamy, Manohar M G and Hemanth K S ) |
3.20 - 3.40PM |
Tuning Of Cost-231 Hata Model For Radio Wave Propagation Predictions ( Chhaya Dalela1, M V S N Prasad2, P K Dalela ) |
3.40 - 4.00PM |
-----------Break----------- |
4.00 - 4.20PM
|
An Comparison with Property Based Resource Attestation to Secure Cloud Environment
( Ravindra k.gupta, Rajat Pali , Shailendra Singh and Ashutosh Kumar Dubey ) |
4.20 - 4.40PM
|
SubGraD- An Approach for Subgraph Detection
( Akshara Pande, Vivekanand Pant and S. Nigam ) |
4.40 - 5.00PM
|
CloudPass – a passport system based on Cloud Computing and Near Field Communication
( Adethya Sudarsanan ) |
5.00 - 5.20PM
|
FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator ( Navdeep Prashar and Balwinder Singh ) |
5.20 - 5.40PM
|
Generation and Optimization of Test case for Object Oriented Software Using State Chart Diagram
( Ranjita Swain,Prafulla Kumar Behera and Durga Prasad Mahapatra ) |
5.40 - 6.00PM |
A Novel Approach For Feature Extraction And Selection On Mri Images For Brain Tumor Classification ( V.P.Gladis Pushpa Rathi and S.Palani ) |